Cryptolocker vs Comodo’s Containment

July 9, 2015 | By Editor
1 Star2 Stars3 Stars4 Stars5 Stars

Cryptolocker, the ransomware Trojan, works like this:

1. Reads a file
2. Encrypts that file
3. Overwrites original file with encrypted file
4. Demands ransom

comodo containment

But when Cryptolocker meets Comodo’s Containment technology, any new unknown file goes into Comodo Containment.
The results are devastating to Cryptolocker:

1. Reads a file
2. Encrypts that file
3. Cryptolocker FAILS miserably…because, with Comodo Containment, malware can’t alter hard disk data—It can only alter a virtual hard disk which Comodo provides you within containment.
Which means…
4. A happy Comodo user

Comodo is the only antivirus company that brings battle tested, proven containment technology to enterprise.
Learn more about The World’s First Automatic Containment Technology

Website Security Software

Be Sociable, Share!

    Add new comment

    Your name

    You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


    What Hidden Threats LurkOn Your Endpoints?

    Get complete security from known and unknown threats from Comodo Endpoint Protection

    free threat scan

    How Secure is your network against Internet-based Attacks?

    Take the instant Network Security Assessment to get your security score!

    test my security now